{"id":"CVE-2018-19497","details":"In The Sleuth Kit (TSK) through 4.6.4, hfs_cat_traverse in tsk/fs/hfs.c does not properly determine when a key length is too large, which allows attackers to cause a denial of service (SEGV on unknown address with READ memory access in a tsk_getu16 call in hfs_dir_open_meta_cb in tsk/fs/hfs_dent.c).","modified":"2026-04-10T04:08:48.355218Z","published":"2018-11-29T23:29:00.250Z","references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZXFYOOMSP7NWRTSO4XXGHXAY3CJNAJ6/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLSVLDQLPGKRHHBPYUXVJJPAID6CYBXD/"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/12/msg00008.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/06/msg00015.html"},{"type":"FIX","url":"https://github.com/sleuthkit/sleuthkit/pull/1374"},{"type":"FIX","url":"https://github.com/sleuthkit/sleuthkit/commit/bc04aa017c0bd297de8a3b7fc40ffc6ddddbb95d"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/sleuthkit/sleuthkit","events":[{"introduced":"0"},{"last_affected":"d740b43b8e18cec01dab3b783329e6a00d551b80"},{"fixed":"bc04aa017c0bd297de8a3b7fc40ffc6ddddbb95d"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.6.4"}]}}],"versions":["sleuthkit-4.0.2","sleuthkit-4.6.3","sleuthkit-4.6.4"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"29"}]},{"events":[{"introduced":"0"},{"last_affected":"30"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-19497.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}